You are on page 1of 4

Q.5. What is the Responsibility Assignment Matrix?

So you've constructed your work breakdown structure (WBS) and your organizational breakdown structure (OBS). You have a schedule tentatively made. What's missing? Perhaps you should create a responsibility assignment matrix as well.The responsibility assignment matrix links activities to resources. It makes sure that every task is completed by someone. The matrix itself is a chart you can create using Microsoft Excel listing human resources across the top and activities down the left-hand side. The matrix can be as simple as placing a check mark under the resources name for a particular task, or it can get more complicated, indicating precisely which role any given resource has in completing the task.

Why Should you Use a Responsibility Assignment Matrix?
I already mentioned the benefit of knowing exactly whom is responsible for what when using a responsibility assignment matrix. This, while the main reason for creating this beneficial chart, isn't the only reason you might want to create it. By creating a responsibility assignment matrix, you can quickly see whether you have enough resources to complete the project in the time allotted. You can also avoid confusion - especially if you use the roles listed below - over who is assigned to do what when. This prevents Joe from saying "But I thought it was assigned to Mary." Finally, when trying to gain funding for your project, you can paint a realistic picture for perspective investors by showing exactly how many resources are required to finish the project.

How do you Create Responsibility Assignment Matrix?
The first step in creating a responsibility assignment matrix is to decompose your project and create a work breakdown structure. Once you have completed this important first step, you will know what the project deliverables will be. If you compose an organizational breakdown structure - breaking the project down into a hierarchy of departments, it will facilitate the process of assigning deliverables to responsible parties. Creating this second chart is an option that is highly recommended. Once you have the list of deliverables, open an Excel file. Down the left-hand side list each deliverable. If there were intermediate deliverables discovered in the process of creating the work breakdown structure, list those as well. After listing each deliverable down the side, list each resource across the top of the table. Now, you will assign deliverables to resources using the following code for roles: R: Responsible - this is the resource that owns the work. Each deliverable should have at least one person responsible for it. A: Accountable - this is the person who approves the work. There is only one accountable resource.

Assign each deliverable exactly one accountable party. This is not the same as Change Management.this is the person who delivers information required to complete the work. and the documentation related to these CIs is all SACM describes. or CMDB. V: Verifies: This is the person who ensures that the work meets standards. SACM is a process to identify. software. Read more: http://www. nothing more and nothing less. The activities of SACM all relate to the simple idea of creating and maintaining a database of information regarding CIs. and verify documentation. or seen. Continue until everything has been assigned. Change Management and other ITIL processes use this documentation to make better decisions. In assigning roles. you will use at least the first four listed above RACI.brighthub. and the establishment of that almost mythical of things.aspx#ixzz1G1GpzK33 Q.C: Consulted . S: Supportive: This is the person who provides work in addition to the responsible party. the Configuration Management Database. which is a process for evaluating and handling change requests in the pursuit of quality of service improvement. and then inserting the usage of this database into the decision making process. This simple understanding is the path to success regarding SACM. There has been quite a difficulty in explaining and elaborating configuration management for reason of its technicality that many non-technical personnel and even some neophyte in .7. I: Informed: This is the person who is informed of the progress of the deliverable. record. maintain. the purpose of SACM is to control changes through creation and maintenance of documentation. The Real Purpose of Configuration Management Regardless of what you heard. F: Final Authority: This person gives the final stamp on the completed work. report on. Distribute the responsibility assignment matrix monist the staff and make explicit your expectations for each of them. Assign each deliverable to at least one responsible party. read. Creating and maintaining records of Configuration Items (CI) such as hardware.com/office/projectmanagement/articles/33836.

The ever growing and the increasing complexity of information technology require upgrades to many computer systems and networks. it can well be understood by the purpose and goals of configuration management technology. configurations and changes that take place in a computer system or network can be easily tracked.configuration management technology fail to comprehend. This greatly reduces the vulnerabilities of a computer system from non-authorized intrusions that can come from internal and external sources. In addition to this. configuration management maintains the integrity of the whole computer system by assuring that all changes and configurations that have been deployed are appropriate for all components in the system. Configuration management technology prevents the occurrence of such problem by recording the details of changes that are done to the components and devices of a computer system. Configuration management makes it easier for computer systems to evolve with the changes in technology. Configuration management makes it less difficult to change configurations and set ups of computer systems by providing a fall back option when a new configuration version or upgrade backfires. With a configuration management software in place. While change and configuration are required to catch up with the evolving needs and demands in information technology. configuration can be quite risky. The problem with configuring computer system to newer versions.1 Purpose of Configuration Management Configuration management exists because changes to an existing . While the concept of configuration management is difficult to grasp. Systems and even security solutions such as firewalls tend to be more hazardous when misconfigurations occur. Configuration management has therefore been considered by many as the "holy grail" of software and information technology. it would be a lot easier to track changes and more importantly errors that could have resulted in network downtime and outages. This way. This will not only reduce configuration risks but will also minimize network downtimes that can result in costly losses among organizations. 5. it can well be described and explained according to its goals and purposes. It also makes it less risky to configure computer systems and enhances the security features of a computer network. Configuration management makes it less risky and less difficult to configure computer systems. Configuration management enhances the security features of a computer network. While there can be limitations in defining the concrete meaning of configuration management. however. all processes. is that it sometimes results in error and damages to the system. Configuration management makes it easier for computer systems to evolve with the changes in software and computer technology. Configuration management softwares do this by enabling the computer system to turn back to a previously good configuration set up when new configuration versions fail.

ADP system are inevitable. Q. Configuration management provides assurance that additions. do not adversely affect the implementation of the security policy of the TCB. . It accomplishes this by providing procedures to ensure that the TCB and all documentation are updated properly. deletions. or in the case of trusted systems. or changes made to the TCB do not compromise the trust of the originally evaluated system. The purpose of configuration management is to ensure that these changes take place in an identifiable and controlled environment and that they do not adversely affect any properties of the system.

0.411.

3.9 2.5740.02039.

08.79..

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a^\[_W[X[ZXYa^S`[Z SZSYWWZ` #0.94370.:.8-0036:90.33.574.

431:7.3..078438 40.420174239073.089 0887894.3//.24347.9432.70.943.3/03.9432.3/09073.:7910..05941../3.9432..70.438/070/-2.. 570.03.431:7.431:7.3089.3/.3.7-0/.3.07 89.0.943 2.8.3/31472.30.2...389039079419040./0-.3..020390898-0.431:7.020392.344 %00..9432.0 5.425430398.8170.807147.-390..9.:994.94390.0990.0708:90/330947/43920.88:739.3.3-00.308390.3//0...020392.:307.39.9432.3/088/11.0890..08949088902 431:7..489 48808.9:70841.4594303.30.9432.0 .9.0 418:.425:907889028940.08808 .344  09070..431:73.:7 431:7.3.431:7.431:7. 94:/-0.344 .425:90788902949:73-.43.431:7..47/390/09.431:7.30893 .39 0774789.:59900.020392.943809:50330.0890 .425:907889028..70706:70/94.0203990.425:907 30947     !:7548041431:7.4250941 31472.0-003/0540/.:7703...02039 9 .9432.943.:7910.:7984:9438 8:.425:907889028.85 9.0784347:57.4.431:70.0380.020398/11.70/4309490.344 9.089088/11..94383/013390..70.3/.308.3.84:7.30-0/08.020398419..3.431:7.344706:70:57.94390.1708  431:7.425:90788902943007..3.3-06:9078 $89028.3/809:5841.9432.9:70841.0990.943.3708:93.-90841.431:7.0/ %870.30/.089080.8079497..3...557457.425:907889028940.574.3/4:9.0203903.8 90701470-003.431:7.9..3/.9.0890.:80.-.431:7.9432..089080.94389.30.842.943.9438.89047.9438  431:7.//9439498  .3.99.431:7.425:90790.70.9.431:7..3.9 .3/4.3.9432.30894.4:/.431:7.9432.3341.02039 2.841.708/498-03./08942.07743.08908878.431:7.7035.3.4257003/ 431:7....344570.47/394984.3/247025479.30-0:3/078944/- 905:75480..9.841.425430398390 88902  431:7.3300/8.943.4.425:907889028- 574.0203990..425:90788902 %8.3.020398419.3/83 31472..1..94.431:70.709020.425:907889021742343 .9432.970/:.08 3.425:907889024730947.:9947.897.3.9432.807147.43.83..94390.3.0398904.94384.08  090. ..3.3/.425:907889028  0.574-02-70..0784381.94.490.7/4:80328.3/309478 %0574-02 9.90147.3.3/5:754808  431:7.3//02. ..:9470/397:84389.418419.3/0.020392.0203990.943788-:9.3-029.425:90730947 9.9432.3441.08 41.3/05.3.425:90788902-.8903/94-02470.9984209208708:983 07747.3.344 431:7.3083 8419.84232030947/4392089. %834943 70/:.9438.3/903.4.02039  431:7...:994..3.3089.02039.308.4:844/.

-0.943.42580898-574..3.3089.//9438 /009438 47.90/ 88902 9..0780./08./094 90%/4349./3574.3082.0/:70894038:70 9.3/.425742809097:894190473..431:7.:7954.7030.90/574507    .4190% 431:7..02039894038:709.0.3574507908419088902 47390.3/9.9.09.9.88:7.:2039..02039 574.0780.3.110.439740/03./4.94341 9080.70:5/.:.990/4349 .-0 %05:7548041..99080. .990%.3 /0391.!88902.05../.03.9902502039.3.9432.7432039.943 2./.110.9.3/.8041 97:890/889028 /4349.